Patents by Inventor Toshinori Araki
Toshinori Araki has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180239910Abstract: In a system with registration data, in a data registration phase, encrypted data is calculated by encrypting input data to be concealed by using a secret key and secret information, registration data is generated based on the encrypted data and verification key, and the registration data is stored as a registration template in a storage unit together with an identifier for uniquely identifying the registration data. In an encrypted text verification phase, a data verifying request is generated in which input data to be verified has been encrypted by using a random number and secret information, the registration template stored in the storage unit and the data verifying request are matched verified to produce a determined result, a verified result including a part or all of the registration template corresponding to the determined result is produced, and data is restored based on the verified result to produce a restored result.Type: ApplicationFiled: January 27, 2016Publication date: August 23, 2018Inventors: Toshiyuki ISSHIKI, Kengo MORI, Toshinori ARAKI, Satoshi OBANA
-
Publication number: 20180241747Abstract: An information processing apparatus that authenticates sets of distributed authentication information without collecting, the sets of distributed authentication information, to be collected at any one of apparatuses included in a system.Type: ApplicationFiled: August 18, 2016Publication date: August 23, 2018Applicant: NEC CORPORATIONInventors: Yuki TANAKA, Jun FURUKAWA, Kazuma OHARA, Toshinori ARAKI
-
Patent number: 9985779Abstract: An encrypted text matching system is provided. The system is configured to generate first auxiliary data and second auxiliary to verify matching between a first encrypted text that is and a second encrypted text based on a Hamming distance between plaintexts; perform one-way conversion on at least part of the first auxiliary data; perform one-way conversion on intermediate data that is generated based on a difference between the first encrypted text and the second encrypted text and on the second auxiliary data; and determine, by using a result of the one-way conversion performed on the intermediate data as well as using the first auxiliary data that underwent the one-way conversion, whether a Hamming distance between plaintexts is equal to or less than a predetermined certain value, the Hamming distance corresponding to the difference between the first encrypted text and the second encrypted text.Type: GrantFiled: April 23, 2014Date of Patent: May 29, 2018Assignee: NEC CORPORATIONInventors: Toshiyuki Isshiki, Kengo Mori, Toshinori Araki
-
Publication number: 20180139045Abstract: An intermediate apparatus that upon reception of a request from an application apparatus, instructs a plurality of secure computation apparatuses to perform a secret computation processing, in accordance with the request, performs a part of operation of the request from the application apparatus, on at least one of a part of data included in the request or data reconstructed from shares received from a plurality of secure computation apparatuses.Type: ApplicationFiled: May 7, 2015Publication date: May 17, 2018Applicant: NEC CORPORATIONInventors: Jun FURUKAWA, Kengo MORI, Isamu TERANISHI, Toshinori ARAKI
-
Patent number: 9906363Abstract: The present invention makes it possible, in encrypted data verification, to avoid the leaking of information related to the original plaintext, thereby ensuring safety. The system of the present invention is provided with: means (103 in FIG. 1) for generating first and second auxiliary data for verifying whether or not the Hamming distance of a plaintext between a first encrypted data in which input data is encrypted and is recorded in a storage device, and a second encrypted data obtained by encrypting input data of a target to be checked is equal to or less than a predetermined value; and means (402 and 403 in FIG. 1) for taking the difference between the first encrypted data recorded in the storage device, and the second encrypted data, and determining, using the first and second auxiliary data, whether or not the Hamming distance of the plaintext corresponding to the difference between the first encrypted data and the second encrypted data is equal to or less than the predetermined value.Type: GrantFiled: July 12, 2013Date of Patent: February 27, 2018Assignee: NEC CORPORATIONInventors: Satoshi Obana, Toshiyuki Isshiki, Kengo Mori, Toshinori Araki
-
Patent number: 9900146Abstract: An encrypted text matching system includes: an auxiliary data generating unit that generates first and second auxiliary data, which are for verification of matching between a first encrypted text that is obtained by encrypting input data and is registered with a storage device and a second encrypted text that is obtained by encrypting input data to be matched, the verification being performed by using a Hamming distance between plaintexts; and a matching determining unit that performs one-way conversion on at least part of the second auxiliary data, performs one-way conversion on intermediate data that is generated based on a difference between the first encrypted text and the second encrypted text and on the first auxiliary data, and determines whether a Hamming distance between plaintexts is equal to or less than a predetermined value, the Hamming distance corresponding to the difference between the first and second encrypted text.Type: GrantFiled: April 23, 2014Date of Patent: February 20, 2018Assignee: NEC CORPORATIONInventors: Toshiyuki Isshiki, Kengo Mori, Toshinori Araki
-
Publication number: 20180039792Abstract: In order to provide a server device and the like that are capable of quickly extracting data without need for a client that performs a query of search processing to have a secret key. A server device includes: data storage unit that stores concealed registration data including distribution information of registration data distributed by secret sharing scheme and a ciphertext of the registration data encrypted by searchable encryption; token calculation unit that generates a token for data search of the searchable encryption by communicating with an external server device and performs secret computation by using a search query and the distribution information; and data search unit that performs data search from the token for data search received from the token calculation unit and the concealed registration data acquired from the data storage unit, and outputs a search result.Type: ApplicationFiled: February 5, 2016Publication date: February 8, 2018Inventors: Kazuma OHARA, Toshinori ARAKI, Jun FURUKAWA
-
Patent number: 9882712Abstract: An encrypted text matching system includes: an auxiliary data generating unit that generates first and second auxiliary data, which are for verification of matching between a first encrypted text that is obtained by encrypting at least one of a plurality of data segments into which input data is divided by segmenting unit and that is registered with a storage device and a second encrypted text that is obtained by encrypting at least one of a plurality of data segments into which input data to be matched is divided by segmenting unit, the verification being performed by using a Hamming distance between plaintexts; and a matching determining unit that takes a difference between the first and second encrypted text, and determines whether a Hamming distance between plaintexts that corresponds to the difference between the first and second encrypted text is equal to or less than a predetermined certain value.Type: GrantFiled: April 23, 2014Date of Patent: January 30, 2018Assignee: NEC CORPORATIONInventors: Toshiyuki Isshiki, Kengo Mori, Toshinori Araki
-
Publication number: 20170324563Abstract: In a data registration phase, encrypted data is calculated by encrypting input data to be concealed by using a secret key, registration data is generated based on the encrypted data and a verification key, and the registration data is stored as a registration template in a storage unit together with an identifier for uniquely identifying the registration data. In an encrypted text verification phase, a data verifying request is generated in which input data to be verified has been encrypted by using a random number, the registration template stored in the storage unit and the data verifying request are verified to produce a determined result, a verified result including a part or all of the registration template corresponding to the determined result is produced, and data is restored based on the verified result to produce a restored result.Type: ApplicationFiled: October 26, 2015Publication date: November 9, 2017Applicants: NEC CORPORATIONInventors: Toshiyuki ISSHIKI, Kengo MORI, Toshinori ARAKI, Satoshi OBANA
-
Publication number: 20170272243Abstract: An acquisition unit (2020) acquires a plaintext block sequence and a first cryptographic key. The plaintext block sequence is constituted by a plurality of plaintext blocks. A second-cryptographic-key generation unit (2040) generates a second cryptographic key. A third-cryptographic-key generation unit (2060) generates a third cryptographic key. The third cryptographic key is calculated as exclusive OR between the first cryptographic key and a portion or the entirety of the second cryptographic key. A counter mode encryption unit (2080) encrypts the plaintext block sequence using the third cryptographic key as a cryptographic key, and generates a cryptographic block sequence. A block cryptography using a counter mode as block cipher mode of operation is used in encryption. A key block generation unit (2100) generates a key block. The key block is calculated as exclusive OR between the second cryptographic key and respective blocks of the cryptographic block sequence.Type: ApplicationFiled: October 13, 2015Publication date: September 21, 2017Applicant: NEC CorporationInventor: Toshinori ARAKI
-
Patent number: 9690845Abstract: In the present invention, scope search can be effectively performed in a database having encrypted registration information. A plurality of values, first identification information to identify the plurality of values, and a key are accepted as input. A value group is generated from the plurality of values. The value group is treated as a word group, and a secure index is generated from the word group, the first identification information, and the key. On the basis of a value to be retrieved and a key, trapdoor information for the value to be retrieved is generated. With respect to the generated secure index, a secure index assessment process is performed using the trapdoor information. When the value to be retrieved is assessed to be contained in the secure index as a result of the assessment process, second identification information to identify the secure index is output.Type: GrantFiled: July 27, 2012Date of Patent: June 27, 2017Assignee: NEC CorporationInventors: Toshinori Araki, Isamu Teranishi
-
Patent number: 9621533Abstract: A system includes a first bit string position permutation unit to perform position permutation of an input first bit string; a template generation unit to perform an exclusive OR operation of a bit string resulting from the position permutation of the first bit string and a code word of a binary linear code and generate auxiliary data; a second bit string position permutation unit to perform same position permutation of an input second bit string; and a bit string collation unit to verify that a hamming distance between position permutation result of the second and second bit strings is not more than a predetermined value.Type: GrantFiled: December 13, 2013Date of Patent: April 11, 2017Assignee: NEC CorporationInventors: Toshiyuki Isshiki, Toshinori Araki, Kengo Mori
-
Patent number: 9600677Abstract: Provided a database apparatus comprising a control means to execute data access control on a database, wherein the control means, receiving a database operation command from a user apparatus, comprises, regarding data and/or metadata to be handled associated with the database operation command, means for executing database operation or computation on encrypted data and/or encrypted metadata as is in ciphertext and means for executing database operation or computation on plaintext data and/or plaintext metadata, and the control means sends a processing result to the user apparatus.Type: GrantFiled: November 9, 2012Date of Patent: March 21, 2017Assignee: NEC CORPORATIONInventors: Kengo Mori, Satoshi Obana, Jun Furukawa, Isamu Teranishi, Toshiyuki Isshiki, Toshinori Araki
-
Patent number: 9349023Abstract: A user apparatus connected to database apparatus via network comprises: unit that manages key information in order to encrypt and decrypt; storage unit that stores security configuration information of data and/or metadata; application response unit that determines whether or not encryption is necessary for database operation command, and if encryption is necessary, selects encryption algorithm corresponding to data and/or metadata, performs encryption, and transmits result to database control unit to cause database control unit to execute database operation, if encryption is not necessary, transmits database operation command to database control unit to cause database control unit to execute database operation, and receives processing result transmitted by database control unit, and if decryption or conversion of data and/or metadata of processing result is necessary, performs necessary decryption or conversion, and returns response to database operation command; and security configuration unit that configurType: GrantFiled: July 3, 2014Date of Patent: May 24, 2016Assignee: NEC CORPORATIONInventors: Kengo Mori, Satoshi Obana, Jun Furukawa, Isamu Teranishi, Toshiyuki Isshiki, Toshinori Araki
-
Publication number: 20160105277Abstract: An encrypted text matching system includes: an auxiliary data generating unit that generates first and second auxiliary data, which are for verification of matching between a first encrypted text that is obtained by encrypting at least one of a plurality of data segments into which input data is divided by segmenting unit and that is registered with a storage device and a second encrypted text that is obtained by encrypting at least one of a plurality of data segments into which input data to be matched is divided by segmenting unit, the verification being performed by using a Hamming distance between plaintexts; and a matching determining unit that takes a difference between the first and second encrypted text, and determines whether a Hamming distance between plaintexts that corresponds to the difference between the first and second encrypted text is equal to or less than a predetermined certain value.Type: ApplicationFiled: April 23, 2014Publication date: April 14, 2016Applicant: NEC CORPORATIONInventors: Toshiyuki ISSHIKI, Kengo MORI, Toshinori ARAKI
-
Patent number: 9300471Abstract: An information processing apparatus includes: a storage unit that stores a tree structure formed by nodes, each of which is stores identification information identifying a document; and a registration unit that registers documents in the storage unit. The registration unit receives a document including identification information identifying the document and a word set and a key, registers the identification information in a leaf node in the tree structure, and calculates a secure index corresponding to identification information registered in each node from a root node to the leaf node in the tree structure based on the word set and the key. In addition, the registration unit generates a value calculated by adding the calculated secure index as a search index for the document and stores a value calculated by adding a search index generated for each of a plurality of received documents as a search index for the plurality of documents in the storage unit.Type: GrantFiled: July 6, 2012Date of Patent: March 29, 2016Assignee: NEC CORPORATIONInventors: Toshinori Araki, Isamu Teranishi, Jun Furukawa
-
Publication number: 20160080142Abstract: An encrypted text matching system includes: an auxiliary data generating unit that generates first and second auxiliary data, which are for verification of matching between a first encrypted text that is obtained by encrypting input data and is registered with a storage device and a second encrypted text that is obtained by encrypting input data to be matched, the verification being performed by using a Hamming distance between plaintexts; and a matching determining unit that performs one-way conversion on at least part of the second auxiliary data, performs one-way conversion on intermediate data that is generated based on a difference between the first encrypted text and the second encrypted text and on the first auxiliary data, and determines whether a Hamming distance between plaintexts is equal to or less than a predetermined value, the Hamming distance corresponding to the difference between the first and second encrypted text.Type: ApplicationFiled: April 23, 2014Publication date: March 17, 2016Inventors: TOSHIYUKI ISSHIKI, KENGO MORI, TOSHINORI ARAKI
-
Publication number: 20160072624Abstract: An encrypted text matching system includes: an auxiliary data generating unit configured to generate first auxiliary data and second auxiliary data, respectively, which are for verification of matching between a first encrypted text that is obtained by encrypting input data and is registered with a storage device and a second encrypted text that is obtained by encrypting input data to be matched, the verification being performed by using a Hamming distance between plaintexts; and matching determining unit configured to perform one-way conversion on at least part of the first auxiliary data, perform one-way conversion on intermediate data that is generated based on a difference between the first encrypted text and the second encrypted text and on the second auxiliary data, and determine, by using a result of the one-way conversion performed on the intermediate data as well as using the first auxiliary data that underwent the one-way conversion, whether a Hamming distance between plaintexts is equal to or lessType: ApplicationFiled: April 23, 2014Publication date: March 10, 2016Applicant: NEC CORPORATIONInventors: Toshiyuki ISSHIKI, Kengo MORI, Toshinori ARAKI
-
Publication number: 20150334100Abstract: A system includes a first bit string position permutation unit to perform position permutation of an input first bit string; a template generation unit to perform an exclusive OR operation of a bit string resulting from the position permutation of the first bit string and a code word of a binary linear code and generate auxiliary data; a second bit string position permutation unit to perform same position permutation of an input second bit string; and a bit string collation unit to verify that a hamming distance between position permutation result of the second and second bit strings is not more than a predetermined value.Type: ApplicationFiled: December 13, 2013Publication date: November 19, 2015Applicant: NEC CORPORATIONInventors: Toshiyuki ISSHIKI, Toshinori ARAKI, Kengo MORI
-
Publication number: 20150195090Abstract: The present invention makes it possible, in encrypted data verification, to avoid the leaking of information related to the original plaintext, thereby ensuring safety. The system of the present invention is provided with: means (103 in FIG. 1) for generating first and second auxiliary data for verifying whether or not the Hamming distance of a plaintext between a first encrypted data in which input data is encrypted and is recorded in a storage device, and a second encrypted data obtained by encrypting input data of a target to be checked is equal to or less than a predetermined value; and means (402 and 403 in FIG. 1) for taking the difference between the first encrypted data recorded in the storage device, and the second encrypted data, and determining, using the first and second auxiliary data, whether or not the Hamming distance of the plaintext corresponding to the difference between the first encrypted data and the second encrypted data is equal to or less than the predetermined value.Type: ApplicationFiled: July 12, 2013Publication date: July 9, 2015Applicant: NEC CORPORATIONInventors: Satoshi Obana, Toshiyuki Isshiki, Kengo Mori, Toshinori Araki